BYOD

How BYOD Impacts Device Security

Today’s employees want to — and in many cases today, have to — be productive and available from anywhere at any time. More than ever, teams need to communicate and collaborate from different locations through a variety of channels, devices, and networks. In order to address this need, companies are starting to think harder about clear Bring Your…

Raise the Roof for Carlisle Construction Materials: How Thousands of Employees Rely on Okta Mobility Management

When it comes to building a structure that can weather any storm, many construction companies turn to Carlisle Construction Materials for top-quality roofing and other materials. But as the Pennsylvania-based supplier saw many of its 3,000 employees increasingly using mobile devices, the organization needed a way to ensure their workers could…

Instead Of Banning BYOD, Enable It Securely

In a document released this year by British intelligence and security organisation, GCHQ, it was revealed that the firm has called for firms to ban BYOD. In the report, the organisation claims staff represent the “weakest link in the security chain” and can, whether it is intentional or not, be responsible for leaking data to foreign espionage…

EMM and MFA without the WTF

If you happen to be at RSA this week, you’re likely to encounter all sorts of acronyms – including CSA, MDM, CISO, MFA, CCSK… the list goes on. Keeping up with all these acronyms is one thing – and trying to keep up with the latest technology is an entirely separate task. As we look at the proliferation of mobile devices – and additional security…

How the Cloud Can Assuage IT Challenges of BYOD

Last week, we talked about the some of the challenges associated with the use of consumer mobile devices in business. This week we wanted to dig a little deeper into what exactly these challenges are. In a recent post for TechTarget, Michelle Boisvert outlines where the security risks come into play with BYOD and how they require a strong cloud…

Archive